Student Objectives
The essence of this section is to enable you to;
  1. Analyze the relationships among ethical, social, and political issues that are raised by information systems.
  2. Identify the main moral dimensions of an information society and specific principles for conduct that can be used to guide ethical decisions.
  3. Evaluate the impact of contemporary information systems and the Internet on the protection of individual privacy and intellectual property.
  4. Assess how information systems have affected everyday life.



external image ps_bkgd_upper_left.gif
external image pixel.gif
external image ps_bkgd_upper_right.gif
external image pixel.gif


Question 1.
Question 1.


Which moral dimension of the information age involves cultural values and practices?

external image problem_type_1.gif
Open Hint for Question 1 in a new window.
Open Hint for Question 1 in a new window.




Information rights and obligations

Accountability and control

Property rights and obligations

Quality of life


external image pixel.gif
external image ps_bkgd_lower_left.gif

End of Question 1
End of Question 1


external image ps_bkgd_upper_left.gif
external image pixel.gif
external image ps_bkgd_upper_right.gif
external image pixel.gif


Question 2.
Question 2.


Using computers to combine data from multiple sources and creating electronic dossiers of detailed information on individuals is called

external image problem_type_2.gif
Open Hint for Question 2 in a new window.
Open Hint for Question 2 in a new window.




nonobvious relationship awareness (NORA).

profiling.

due process.

informed consent.


external image pixel.gif
external image ps_bkgd_lower_left.gif

End of Question 2
End of Question 2


external image ps_bkgd_upper_left.gif
external image pixel.gif
external image ps_bkgd_upper_right.gif
external image pixel.gif


Question 3.
Question 3.


Correlating relationships to find obscure hidden connections in disparate databases and other sources is called

external image problem_type_3.gif
Open Hint for Question 3 in a new window.
Open Hint for Question 3 in a new window.




nonobvious relationship awareness.

profiling.

due process.

informed consent.


external image pixel.gif
external image ps_bkgd_lower_left.gif

End of Question 3
End of Question 3


external image ps_bkgd_upper_left.gif
external image pixel.gif
external image ps_bkgd_upper_right.gif
external image pixel.gif


Question 4.
Question 4.


A basic ethical concept that means mechanisms are in place to determine who took responsible action or who is responsible for certain actions is

external image problem_type_4.gif
Open Hint for Question 4 in a new window.
Open Hint for Question 4 in a new window.




responsibility.

liability.

accountability.

due process.


external image pixel.gif
external image ps_bkgd_lower_left.gif

End of Question 4
End of Question 4


external image ps_bkgd_upper_left.gif
external image pixel.gif
external image ps_bkgd_upper_right.gif
external image pixel.gif


Question 5.
Question 5.


Most American and European privacy law is based on a regime called

external image problem_type_5.gif
Open Hint for Question 5 in a new window.
Open Hint for Question 5 in a new window.




fair information practices (FIP).

privacy rights of individuals.

safe harbor theories.

opt-out models of informed consent.


external image pixel.gif
external image ps_bkgd_lower_left.gif

End of Question 5
End of Question 5


external image ps_bkgd_upper_left.gif
external image pixel.gif
external image ps_bkgd_upper_right.gif
external image pixel.gif


Question 6.
Question 6.


Tiny files deposited on a computer hard drive when a user visits certain Web sites are called

external image problem_type_6.gif
Open Hint for Question 6 in a new window.
Open Hint for Question 6 in a new window.




Web bugs.

cookies.

safe harbors.

viruses.


external image pixel.gif
external image ps_bkgd_lower_left.gif

End of Question 6
End of Question 6


external image ps_bkgd_upper_left.gif
external image pixel.gif
external image ps_bkgd_upper_right.gif
external image pixel.gif


Question 7.
Question 7.


The model of informed consent permits the collection of personal information until the consumer specifically requests that data not be collected.

external image problem_type_7.gif
Open Hint for Question 7 in a new window.
Open Hint for Question 7 in a new window.




safe harbor

platform for privacy preferences

opt-out

opt-in


external image pixel.gif
external image ps_bkgd_lower_left.gif

End of Question 7
End of Question 7


external image ps_bkgd_upper_left.gif
external image pixel.gif
external image ps_bkgd_upper_right.gif
external image pixel.gif


Question 8.
Question 8.


An intellectual work product used for a business purpose is classified as a provided it is not based on information in the public domain.

external image problem_type_8.gif
Open Hint for Question 8 in a new window.
Open Hint for Question 8 in a new window.




copyright

patent

digital millennium copyright

trade secret


external image pixel.gif
external image ps_bkgd_lower_left.gif

End of Question 8
End of Question 8


external image ps_bkgd_upper_left.gif
external image pixel.gif
external image ps_bkgd_upper_right.gif
external image pixel.gif


Question 9.
Question 9.


Which law protects creators of intellectual property for the life of the author plus an additional 70 years after the author's death?

external image problem_type_9.gif
Open Hint for Question 9 in a new window.
Open Hint for Question 9 in a new window.




Copyright

Trade secret

Patent

Digital Millennium copyright


external image pixel.gif
external image ps_bkgd_lower_left.gif

End of Question 9
End of Question 9


external image ps_bkgd_upper_left.gif
external image pixel.gif
external image ps_bkgd_upper_right.gif
external image pixel.gif


Question 10.
Question 10.


Which law grants the owner an exclusive monopoly on the ideas behind an invention for 20 years?

external image problem_type_10.gif
Open Hint for Question 10 in a new window.
Open Hint for Question 10 in a new window.




Copyright

Trade secret

Patent

Digital millennium copyright


external image pixel.gif
external image ps_bkgd_lower_left.gif

End of Question 10
End of Question 10


external image ps_bkgd_upper_left.gif
external image pixel.gif
external image ps_bkgd_upper_right.gif
external image pixel.gif


Question 11.
Question 11.


The commission of acts involving a computer that may not be illegal but are considered unethical is known as

external image problem_type_11.gif
Open Hint for Question 11 in a new window.
Open Hint for Question 11 in a new window.




computer crime.

information privacy violations.

lack of accountability.

computer abuse.


external image pixel.gif
external image ps_bkgd_lower_left.gif

End of Question 11
End of Question 11


external image ps_bkgd_upper_left.gif
external image pixel.gif
external image ps_bkgd_upper_right.gif
external image pixel.gif


Question 12.
Question 12.


Which of the following is not a principal source of poor system performance?

external image problem_type_12.gif
Open Hint for Question 12 in a new window.
Open Hint for Question 12 in a new window.




Software bugs and errors

Government regulation

Hardware or facility failures

Poor input data quality


external image pixel.gif
external image ps_bkgd_lower_left.gif

End of Question 12
End of Question 12


external image ps_bkgd_upper_left.gif
external image pixel.gif
external image ps_bkgd_upper_right.gif
external image pixel.gif


Question 13.
Question 13.


Which of the following makes it illegal to circumvent technology-based protections of copyrighted materials?

external image problem_type_13.gif
Open Hint for Question 13 in a new window.
Open Hint for Question 13 in a new window.




Freedom of Information Act of 1966

E-Government Act of 2002

World Intellectual Property Organization Treaty

Electronic Communications Privacy Act of 1986


external image pixel.gif
external image ps_bkgd_lower_left.gif

End of Question 13
End of Question 13


external image ps_bkgd_upper_left.gif
external image pixel.gif
external image ps_bkgd_upper_right.gif
external image pixel.gif


Question 14.
Question 14.


The single largest source of repetitive stress injuries is

external image problem_type_14.gif
Open Hint for Question 14 in a new window.
Open Hint for Question 14 in a new window.




computer monitors.

computer keyboards.

computer mouse.

computer speakers.


external image pixel.gif
external image ps_bkgd_lower_left.gif

End of Question 14
End of Question 14


external image ps_bkgd_upper_left.gif
external image pixel.gif
external image ps_bkgd_upper_right.gif
external image pixel.gif


Question 15.
Question 15.


The most common kind of computer-related repetitive stress injury is

external image problem_type_15.gif
Open Hint for Question 15 in a new window.
Open Hint for Question 15 in a new window.




computer vision syndrome.

severe back pain.

technostress.

carpal tunnel syndrome (CTS).


external image pixel.gif
external image ps_bkgd_lower_left.gif

End of Question 15
End of Question 15


external image ps_bkgd_upper_left.gif
external image pixel.gif
external image ps_bkgd_upper_right.gif
external image pixel.gif


Question 16.
Question 16.


In today's new legal environment, managers who violate the law and are convicted will most likely spend time in prison.

external image problem_type_16.gif
Open Hint for Question 16 in a new window.
Open Hint for Question 16 in a new window.


True False

external image pixel.gif
external image ps_bkgd_lower_left.gif

End of Question 16
End of Question 16


external image ps_bkgd_upper_left.gif
external image pixel.gif
external image ps_bkgd_upper_right.gif
external image pixel.gif


Question 17.
Question 17.


Information systems don't necessarily threaten existing distributions of power, money, rights, and obligations.

external image problem_type_17.gif
Open Hint for Question 17 in a new window.
Open Hint for Question 17 in a new window.


True False

external image pixel.gif
external image ps_bkgd_lower_left.gif

End of Question 17
End of Question 17


external image ps_bkgd_upper_left.gif
external image pixel.gif
external image ps_bkgd_upper_right.gif
external image pixel.gif


Question 18.
Question 18.


Political institutions do not require a demonstration of real harm before they develop new laws governing information systems.

external image problem_type_18.gif
Open Hint for Question 18 in a new window.
Open Hint for Question 18 in a new window.


True False

external image pixel.gif
external image ps_bkgd_lower_left.gif

End of Question 18
End of Question 18


external image ps_bkgd_upper_left.gif
external image pixel.gif
external image ps_bkgd_upper_right.gif
external image pixel.gif


Question 19.
Question 19.


Advances in data storage techniques and rapidly declining storage costs have been responsible for the multiplying databases on individuals.

external image problem_type_19.gif
Open Hint for Question 19 in a new window.
Open Hint for Question 19 in a new window.


True False

external image pixel.gif
external image ps_bkgd_lower_left.gif

End of Question 19
End of Question 19


external image ps_bkgd_upper_left.gif
external image pixel.gif
external image ps_bkgd_upper_right.gif
external image pixel.gif


Question 20.
Question 20.


Accountability means that you accept the potential costs, duties, and obligations for the decisions you make.

external image problem_type_20.gif
Open Hint for Question 20 in a new window.
Open Hint for Question 20 in a new window.


True False

external image pixel.gif
external image ps_bkgd_lower_left.gif

End of Question 20
End of Question 20


external image ps_bkgd_upper_left.gif
external image pixel.gif
external image ps_bkgd_upper_right.gif
external image pixel.gif


Question 21.
Question 21.


At present, most U.S. federal privacy laws apply only to the federal government and regulate very few areas of the private sector.

external image problem_type_21.gif
Open Hint for Question 21 in a new window.
Open Hint for Question 21 in a new window.


True False

external image pixel.gif
external image ps_bkgd_lower_left.gif

End of Question 21
End of Question 21


external image ps_bkgd_upper_left.gif
external image pixel.gif
external image ps_bkgd_upper_right.gif
external image pixel.gif


Question 22.
Question 22.


A safe harbor requires government regulation and enforcement.

external image problem_type_22.gif
Open Hint for Question 22 in a new window.
Open Hint for Question 22 in a new window.


True False

external image pixel.gif
external image ps_bkgd_lower_left.gif

End of Question 22
End of Question 22


external image ps_bkgd_upper_left.gif
external image pixel.gif
external image ps_bkgd_upper_right.gif
external image pixel.gif


Question 23.
Question 23.


Most Internet businesses do little to protect customer privacy.

external image problem_type_23.gif
Open Hint for Question 23 in a new window.
Open Hint for Question 23 in a new window.


True False

external image pixel.gif
external image ps_bkgd_lower_left.gif

End of Question 23
End of Question 23


external image ps_bkgd_upper_left.gif
external image pixel.gif
external image ps_bkgd_upper_right.gif
external image pixel.gif


Question 24.
Question 24.


Copyright law protects both the underlying ideas behind a work and the manifestation in a work.

external image problem_type_24.gif
Open Hint for Question 24 in a new window.
Open Hint for Question 24 in a new window.


True False

external image pixel.gif
external image ps_bkgd_lower_left.gif

End of Question 24
End of Question 24


external image ps_bkgd_upper_left.gif
external image pixel.gif
external image ps_bkgd_upper_right.gif
external image pixel.gif


Question 25.
Question 25.


The Internet has made it much easier to protect intellectual property.

external image problem_type_25.gif
Open Hint for Question 25 in a new window.
Open Hint for Question 25 in a new window.


True False

external image pixel.gif
external image ps_bkgd_lower_left.gif

End of Question 25
End of Question 25



external image ps_bkgd_upper_left.gif
external image pixel.gif
external image ps_bkgd_upper_right.gif
external image pixel.gif


Question 26.
Question 26.


Internet service providers (ISPs) are required to take down sites of copyright infringers that they are hosting once they are notified of the problem.

external image problem_type_26.gif
Open Hint for Question 26 in a new window.
Open Hint for Question 26 in a new window.


True False

external image pixel.gif
external image ps_bkgd_lower_left.gif

End of Question 26
End of Question 26



external image ps_bkgd_upper_left.gif
external image pixel.gif
external image ps_bkgd_upper_right.gif
external image pixel.gif


Question 27.
Question 27.


Lower-level employees may be empowered to make minor decisions, but the key policy decisions are still very centralized.

external image problem_type_27.gif
Open Hint for Question 27 in a new window.
Open Hint for Question 27 in a new window.


True False

external image pixel.gif
external image ps_bkgd_lower_left.gif

End of Question 27
End of Question 27



external image ps_bkgd_upper_left.gif
external image pixel.gif
external image ps_bkgd_upper_right.gif
external image pixel.gif


Question 28.
Question 28.


Simply accessing a computer system without authorization or with intent to do harm, even by accident, is now a federal crime.

external image problem_type_28.gif
Open Hint for Question 28 in a new window.
Open Hint for Question 28 in a new window.


True False

external image pixel.gif
external image ps_bkgd_lower_left.gif

End of Question 28
End of Question 28



external image ps_bkgd_upper_left.gif
external image pixel.gif
external image ps_bkgd_upper_right.gif
external image pixel.gif


Question 29.
Question 29.


Repetitive stress injuries due to computer use are unavoidable.

external image problem_type_29.gif
Open Hint for Question 29 in a new window.
Open Hint for Question 29 in a new window.


True False

external image pixel.gif
external image ps_bkgd_lower_left.gif

End of Question 29
End of Question 29



external image ps_bkgd_upper_left.gif
external image pixel.gif
external image ps_bkgd_upper_right.gif
external image pixel.gif


Question 30.
Question 30.


According to experts, humans working continuously with computers come to expect other humans to behave like computers.

external image problem_type_30.gif
Open Hint for Question 30 in a new window.
Open Hint for Question 30 in a new window.


True False

external image pixel.gif
external image ps_bkgd_lower_left.gif

End of Question 30
End of Question 30



external image ps_bkgd_upper_left.gif
external image pixel.gif
external image ps_bkgd_upper_right.gif
external image pixel.gif


Question 31.
Question 31.


Discuss how information systems raise new ethical questions for both individuals and societies.

external image problem_type_31.gif
Open Hint for Question 31 in a new window.
Open Hint for Question 31 in a new window.



To create paragraphs in your essay response, type <p> at the beginning of the paragraph, and </p> at the end.



external image pixel.gif
external image ps_bkgd_lower_left.gif

End of Question 31
End of Question 31



external image ps_bkgd_upper_left.gif
external image pixel.gif
external image ps_bkgd_upper_right.gif
external image pixel.gif


Question 32.
Question 32.


Define the four basic concepts of ethics in an information society.

external image problem_type_32.gif
Open Hint for Question 32 in a new window.
Open Hint for Question 32 in a new window.



To create paragraphs in your essay response, type <p> at the beginning of the paragraph, and </p> at the end.



external image pixel.gif
external image ps_bkgd_lower_left.gif

End of Question 32
End of Question 32



external image ps_bkgd_upper_left.gif
external image pixel.gif
external image ps_bkgd_upper_right.gif
external image pixel.gif


Question 33.
Question 33.


Explain the concept of privacy and what the U.S. government is doing to help protect individual online privacy.

external image problem_type_33.gif
Open Hint for Question 33 in a new window.
Open Hint for Question 33 in a new window.



To create paragraphs in your essay response, type <p> at the beginning of the paragraph, and </p> at the end.



external image pixel.gif
external image ps_bkgd_lower_left.gif

End of Question 33
End of Question 33



external image ps_bkgd_upper_left.gif
external image pixel.gif
external image ps_bkgd_upper_right.gif
external image pixel.gif


Question 34.
Question 34.


Discuss how the Internet and other information technologies challenge intellectual property rights.

external image problem_type_34.gif
Open Hint for Question 34 in a new window.
Open Hint for Question 34 in a new window.



To create paragraphs in your essay response, type <p> at the beginning of the paragraph, and </p> at the end.



external image pixel.gif
external image ps_bkgd_lower_left.gif

End of Question 34
End of Question 34



external image ps_bkgd_upper_left.gif
external image pixel.gif
external image ps_bkgd_upper_right.gif
external image pixel.gif


Question 35.
Question 35.


Discuss how technology impacts our quality of life and describe some of the negative social consequences of systems.

external image problem_type_35.gif
Open Hint for Question 35 in a new window.
Open Hint for Question 35 in a new window.



To create paragraphs in your essay response, type <p> at the beginning of the paragraph, and </p> at the end.